|
|
Taiwan Academic Institutional Repository >
Browse by Author
|
"yang c n"
Showing items 86-110 of 166 (7 Page(s) Totally) << < 1 2 3 4 5 6 7 > >> View [10|25|50] records per page
| 國立東華大學 |
2008-07 |
Wireless Image Transmission Using Burst Error Correction Codes
|
Yang,C.N.; Chiu,C.Y.; Chen,.T.S.; Ye,G.C. |
| 國立東華大學 |
2008-05 |
On The Analysis of Visual Cryptography Scheme Underlying XOR Operation
|
Yang,C.N.; Chen,T. S. |
| 國立東華大學 |
2008-05 |
A New Pixel-Value Differencing Steganography Scheme Based on Space Filling Curve
|
Yang,C.N.; Chang,S.H.; Chen,T.S.; Su,C.H. |
| 國立東華大學 |
2008-04 |
Security Analysis on Authentication of Images Using Recursive Visual Cryptography
|
Yang,C.N.; Chen,T.S. |
| 淡江大學 |
2008-01 |
Knockdown of zebrafish Nav1.6 sodium channel impairs embryonic locomotor activities
|
陳曜鴻; Chen, Yau-hung; Huang, F. L.; Cheng, Y. C.; Wu, C. J.; Yang, C. N.; Tsay, H. J. |
| 國立東華大學 |
2007-12 |
Reducing Shadow Size for Visual Cryptography Scheme
|
Yang,C.N.; Peng,A.G.; Chen,T.S. |
| 國立東華大學 |
2007-11 |
Implementation of A High-Security Certificate Service By Embedding Fingerprint In Smart Cards
|
Yang,C.N.; Su,J. S.; Chen,T. S.; Chang,S. H. |
| 國立東華大學 |
2007-10 |
Campus Micropayment System by Mobile Barcode
|
Yang,C.N.; Yen,C. E.; Wang,C. H.; Chen,C. M.; Chen,T. S.; Lee,Y. F. |
| 國立東華大學 |
2007-09 |
Visual Secret Sharing Scheme: Prioritizing the Secret Pixels with Different Pixel Expansions to Enhance the Image Contrast
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2007-08 |
Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2007-07 |
Error Spreading Control in Image Steganographic Embedding Schemes Using Unequal Error Protection
|
Yang,C.N.; Chen,G.J.; Lukac,R.; Chen,T.S. |
| 國立東華大學 |
2007-07 |
Authorized Tracking and Tracing for RFID Tags
|
Yang,C.N.; Laih,C.S.; Chen,M.Y. |
| 國立東華大學 |
2007-07 |
Improvements of image sharing with steganography and authentication
|
Yang,C.N.; Chen,T.S.; Wang,C.C.; Yu,K.H. |
| 國立東華大學 |
2007-07 |
An Image Secret Sharing Scheme with the Capability of Previewing the Secret Image
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2007-06 |
User-Friendly Image Sharing Using Polynomials with Different Primes
|
Yang,C.N.; Yu,K.H.; Lukac,R. |
| 國立東華大學 |
2007-06 |
Registration Tolerant Visual Secret Sharing Schemes Using Two-Sized Subpixels
|
Yang,C.N.; Peng, A.G.; Chen,T.S. |
| 國立東華大學 |
2007-03 |
Applying CAPTCHA Technology to Prevent Click Fraud in E-Commercials
|
Yang,C.N.; Zhou,F.R.; Lu,J.R.; Zheng, T.; Chen,T.S. |
| 國立東華大學 |
2007-01 |
User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes
|
Yang,C.N.; Yu,K.H.; Lukac,R. |
| 國立東華大學 |
2007 |
Applying RFID Technology in Warranty Service Information System
|
Yang,C.N.; Chen,M.Y.; Laih,C.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Lin, Ming-Lang; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting process from deformed growth strata
|
Lin, M. L.; Wang, C.P.; Yang, C.N.; Chen, W.S.; Jeng, F.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Lin, M.L.; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 臺大學術典藏 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Chen, W.S.; Yang, C.N.; Jeng, F.S.; Lin, Ming-Lang; Wang, C.P.; Lin, Ming-Lang; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 國立東華大學 |
2006-11 |
Certificate Services for Cellular Phone Emulator Based on JAVA Card
|
Yang,C.N.; Chen,T.S.; Peng, A.G. |
| 國立東華大學 |
2006-11 |
Access Control for Mouse and Network Functions in Computer Classroom Using RFID Technique
|
Yang,C.N.; Chen,T.S.; Lin,Y.C.; Yu,Y.F.; Chen,Y.F.; Chiu,C.Y.; Lee,U.F. |
Showing items 86-110 of 166 (7 Page(s) Totally) << < 1 2 3 4 5 6 7 > >> View [10|25|50] records per page
|